Download Certified Information Security Manager.CISM.PracticeTest.2018-10-09.368q.tqb

Vendor: ISACA
Exam Code: CISM
Exam Name: Certified Information Security Manager
Date: Oct 09, 2018
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
What is the PRIMARY role of the information security manager in the process of information classification within an organization?
  1. Defining and ratifying the classification structure of information assets
  2. Deciding the classification levels applied to the organization's information assets
  3. Securing information assets in accordance with their classification
  4. Checking if information assets have been classified properly
Correct answer: A
Explanation:
Defining and ratifying the classification structure of information assets is the primary role of the information security manager in the process of information classification within the organization. Choice B is incorrect because the final responsibility for deciding the classification levels rests with the data owners. Choice C is incorrect because the job of securing information assets is the responsibility of the data custodians. Choice D may be a role of an information security manager but is not the key role in this context.
Defining and ratifying the classification structure of information assets is the primary role of the information security manager in the process of information classification within the organization. Choice B is incorrect because the final responsibility for deciding the classification levels rests with the data owners. Choice C is incorrect because the job of securing information assets is the responsibility of the data custodians. Choice D may be a role of an information security manager but is not the key role in this context.
Question 2
Logging is an example of which type of defense against systems compromise?
  1. Containment
  2. Detection
  3. Reaction
  4. Recovery
Correct answer: B
Explanation:
Detection defenses include logging as well as monitoring, measuring, auditing, detecting viruses and intrusion. Examples of containment defenses are awareness, training and physical security defenses. Examples of reaction defenses are incident response, policy and procedure change, and control enhancement. Examples of recovery defenses are backups and restorations, failover and remote sites, and business continuity plans and disaster recovery plans.
Detection defenses include logging as well as monitoring, measuring, auditing, detecting viruses and intrusion. Examples of containment defenses are awareness, training and physical security defenses. Examples of reaction defenses are incident response, policy and procedure change, and control enhancement. Examples of recovery defenses are backups and restorations, failover and remote sites, and business continuity plans and disaster recovery plans.
Question 3
Which of the following is MOST important in developing a security strategy?
  1. Creating a positive business security environment
  2. Understanding key business objectives
  3. Having a reporting line to senior management
  4. Allocating sufficient resources to information security
Correct answer: B
Explanation:
Alignment with business strategy is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
Alignment with business strategy is of utmost importance. Understanding business objectives is critical in determining the security needs of the organization.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!